CVE-2024-38196

Published Aug 13, 2024

Last updated 2 years ago

Overview

Description
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Source
secure@microsoft.com
NVD status
Analyzed
Products
windows_10_1507, windows_10_1607, windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_21h2, windows_11_22h2, windows_11_23h2, windows_11_24h2, windows_server_2008, windows_server_2012, windows_server_2016, windows_server_2019, windows_server_2022, windows_server_2022_23h2

Risk scores

CVSS 3.1

Type
Primary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

nvd@nist.gov
NVD-CWE-noinfo
secure@microsoft.com
CWE-20

Social media

Hype score
Not currently trending
  1. #threatreport #LowCompleteness Tracking Updates to Raspberry Robin | 04-08-2025 Source: https://t.co/0slXSkszi0 Key details below ↓ 🧑‍💻Actors/Campaigns: Raspberry_robin 💀Threats: Raspberry_robin, 🔓CVEs: CVE-2024-38196 \[[Vulners](https://t.co/9wWF8486cr)] - C

    @rst_cloud

    7 Aug 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. ⚠️ New Exploit Alert: Raspberry Robin Evolves This USB-spread malware now uses a Windows CLFS exploit (CVE-2024-38196) + ChaCha-20 encryption to avoid detection. 🔗 Learn more at https://t.co/BGfKhjNVmx #CyberSecurity #MalwareAlert #RaspberryRobin #CLFSExploit #WindowsSec

    @techpio_team

    5 Aug 2025

    55 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Zscaler ThreatLabz revisits Raspberry Robin in our latest analysis. Recent updates include enhanced obfuscation, a shift to ChaCha-20 encryption, a randomized RC4 key seed per campaign, and a new privilege escalation exploit (CVE-2024-38196). Check out our analysis: https://t.co

    @Threatlabz

    4 Aug 2025

    6486 Impressions

    36 Retweets

    110 Likes

    27 Bookmarks

    1 Reply

    0 Quotes

  4. Raspberry Robin has recently been updated and now contains a privilege escalation exploit for CVE-2024-38196. A sample of this exploit is available here: https://t.co/Fl3uYzhCvK

    @Threatlabz

    16 Jan 2025

    2328 Impressions

    7 Retweets

    45 Likes

    8 Bookmarks

    0 Replies

    1 Quote

  5. Another ITW Windows CLFS nday exploit, patched on 2024.08, maybe CVE-2024-38196? https://t.co/FZZTKZJgL7

    @jq0904

    5 Nov 2024

    3490 Impressions

    5 Retweets

    26 Likes

    12 Bookmarks

    0 Replies

    0 Quotes

Configurations

References

Sources include official advisories and independent security research.